Unlocking the Door for Customers to Seamless Access Control

Image courtesy of Jon Webb.
Security integrators are continually looking for ways to help customers enhance their existing access control system. With so many organizations still using legacy technologies, it has become more important than ever to give customers the power of choice when it comes to upgrading their access control technology. And it’s just as important to integrators to ensure that, no matter the choice, customers have a seamless user experience. To accomplish this, most are looking for cost-effective ways to migrate and upgrade their customers’ access control to a more secure platform.
Assessing the End User
The first step is understanding the users’ short-and long-term requirements and assessing what type of system is already in place. For example, if a customer is using proximity cards, an integrator can suggest upgrading to smart cards or mobile credentials and simultaneously upgrading the readers at all openings to ensure interoperability. This will give the user a higher level of security by making duplication of cards difficult. To help migration, customers can have a plastic ID card with both technologies enabled, allowing them to manage convenience and improve their security profile within their budgets and schedules.
Considering Mobile Credentials
In addition, implementing mobile credentials can be a great option for customers. With wallet-based mobile credentials, users simply tap their mobile phone to the reader and access is granted. This eliminates the need to carry key fobs or plastic credentials and offers a more convenient and secure experience for the credential holder. It can be especially convenient for someone that loses their key or ID cards frequently and does not want to be locked out of their building.
- Physical Credentials: Physical credentials in the form of cards, fobs and wristbands should always be an option along with mobile credentials. To deliver the perfect balance of security, speed and performance, choose smart, encrypted credentials such as MIFARE DESFire EV3. Additionally, opting for smart cards with a custom encryption key provides customers a greater level of control, security and flexibility that allows freedom of choice with access control providers and solutions when building their ideal system.
- Bluetooth: The Bluetooth Low Energy credential has come a long way as well. There have been iterations of Bluetooth credentials available for years, but they are typically manufacturer-specific as you would find with a physical smart credential. Bluetooth is a great option, but it could have limitations with other manufacturers’ installed hardware.
- NFC: The emerging use of wallet-based NFC credentials (Near Field Communication) will become the gold standard of access control credentials down the road . Today, we use wallets on our smart phones to pay for goods and services and it’s a very convenient and secure process. In addition, a wallet-based credential can usually be read for up to five hours even if the battery dies. Available in Apple Wallet and Google Wallet, wallet-based mobile credentials can be used in a variety of applications across higher education, multifamily and corporate.
Considering the Cloud
Migrating customers to a cloud-based access control software platform provides additional benefits. One key advantage is being able to manage access from one centralized platform. This can help building owners manage multiple locations even when they are out of the office. A cloud-based access control system typically involves lower upfront costs and can seamlessly integrate into any facility. It also requires minimal set up and staff training, making it a perfect choice for customers who are looking for an easy way to control access 24/7.
Cloud-based access control gives users the ability to see what is going on at their building from their laptop or mobile phone. This feature is invaluable for individuals who travel often, but still want to keep an eye on things and manage who has authorization to access the building.
The Importance of Interoperability
When it comes to security, some organizations are still running disparate systems that don’t speak to each other. The good news is that we are starting to see manufacturers and PACS providers working together to enable interoperability between credentials and devices, ultimately ensuring that users get the convenience they want and the security they need. The onus is on the hardware manufacturers, the software vendors and the credential providers to collaborate in such a way that allows the security integrator the ability to recommend a cohesive, secure and desirable credential solution to their end user.
The key to a successful access control upgrade is giving customers the power of choice. From mobile credentials to physical credentials, it’s important to provide a range of options that help make access control more convenient for users. The goal is to create an ecosystem with compatible systems that all work together and provide customers with a seamless experience. It certainly can be a balancing act getting the right partners in place, but well worth it in the end.